This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated kernel packages that fix various security issues and several
bugs are now available for Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux
A buffer overflow flaw was found in the CIFS virtual file system. A
remote authenticated user could issue a request that could lead to a
denial of service. (CVE-2007-5904, Moderate)
As well, these updated packages fix the following bugs :
* a bug was found in the Linux kernel audit subsystem. When the audit
daemon was setup to log the execve system call with a large number of
arguments, the kernel could run out out memory while attempting to
create audit log messages. This could cause a kernel panic. In these
updated packages, large audit messages are split into acceptable
sizes, which resolves this issue.
* on certain Intel chipsets, it was not possible to load the acpiphp
module using the 'modprobe acpiphp' command. Because the acpiphp
module did not recurse across PCI bridges, hardware detection for PCI
hot plug slots failed. In these updated packages, hardware detection
* on IBM System z architectures that run the IBM z/VM hypervisor, the
IBM eServer zSeries HiperSockets network interface (layer 3) allowed
ARP packets to be sent and received, even when the 'NOARP' flag was
set. These ARP packets caused problems for virtual machines.
* it was possible for the iounmap function to sleep while holding a
lock. This may have caused a deadlock for drivers and other code that
uses the iounmap function. In these updated packages, the lock is
dropped before the sleep code is called, which resolves this issue.
Red Hat Enterprise Linux 4 users are advised to upgrade to these
updated packages, which contain backported patches to resolve these
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 31595 ()
Bugtraq ID: 26438
CVE ID: CVE-2007-5904
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.